Passer au contenu principal
  • Passer des commandes rapidement et facilement
  • Afficher les commandes et suivre l’état de votre expédition
  • Créez et accédez à une liste de vos produits
Certains numéros d’article ont peut-être changé. Si ce n’est pas ce que vous recherchez, essayez de faire une recherche sur tous les articles. Rechercher des articles

Policy Templates in Dell Encryption Personal

Résumé: Compare policy template options in Dell Encryption Personal (formerly known as Dell Data Protection Personal Edition).

Cet article concerne Cet article ne concerne pas Cet article n’est associé à aucun produit spécifique. Toutes les versions du produit ne sont pas identifiées dans cet article.

Instructions

Learn about policy template options in Dell Encryption Personal (formerly Dell Data Protection | Personal Edition).


Affected Products:

  • Dell Encryption Personal
  • Dell Data Protection | Personal Edition

Affected Operating Systems:

  • Windows

When Dell Encryption Personal is initially activated, a policy template must be chosen to complete activation. Policy templates contain a default set of policy settings that work together. Policy templates are to be used as a baseline to be customized to your environment.

This provides an overview of what the templates are designed to encrypt.

Caution: Changing policy templates or applying custom policy settings impacts both the scope of encrypted data and the way that it is encrypted. Dell Technologies recommends contacting Dell ProSupport with any questions before making modifications.
  • Aggressive Protection for All Fixed Drives and External Drives1
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Required
    • Template Differences:
      • Secure Post-Encryption Cleanup: Three Pass Overwrite
      • User Data Encryption Key: User
      • Workstation Scan Priority: High
      • EMS Access to unShielded Media: Block
      • EMS Encryption Rules:
        R#:\
  • PCI Data Security Standard Targeted1
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Required
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Block
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Data Breach Regulatory Targeted1
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Optional
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Read Only
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • HIPAA Regulatory Targeted1
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Optional
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: User
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Read Only
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Basic Protection for All Fixed Drives and External Drives (Default)
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: Optional
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Read Only
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Basic Protection for All Fixed Drives
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: Yes
    • External Drive Encryption: No
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Full Access
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Basic Protection for System Drive Only
    • System Drive Encryption: Yes
    • Fixed Drive Encryption: No
    • External Drive Encryption: No
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Full Access
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Basic Protection for External Drives
    • System Drive Encryption: No
    • Fixed Drive Encryption: No
    • External Drive Encryption: Optional
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: Common
      • Workstation Scan Priority: Normal
      • EMS Access to unShielded Media: Read Only
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf
  • Encryption Disabled
    • System Drive Encryption: No
    • Fixed Drive Encryption: No
    • External Drive Encryption: No
    • Template Differences:
      • Secure Post-Encryption Cleanup: Single Pass Overwrite
      • User Data Encryption Key: User
      • Workstation Scan Priority: No Overwrite
      • EMS Access to unShielded Media: Full Access
      • EMS Encryption Rules:
        R#:\
        -R#:\Black Berry
        ^R#:\;ppt.doc.xls.pptx.docx.xlsx.txt.pdf

1Security standard and regulatory standard templates use a policy set focused on helping achieve compliance, but are expected to require further environmental changes. To meet full compliancy, contact your organization’s security administrator for additional requirements.


To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Produits concernés

Dell Encryption
Propriétés de l’article
Numéro d’article: 000125500
Type d’article: How To
Dernière modification: 27 Aug 2024
Version:  8
Trouvez des réponses à vos questions auprès d’autres utilisateurs Dell
Services de support
Vérifiez si votre appareil est couvert par les services de support.